Palo Alto Networks PAN-OS Multiple Vulnerabilities (PAN-SA-2016-0003, PAN-SA-2016-0005)

Critical Nessus Plugin ID 89688


The remote host is affected by multiple vulnerabilities.


The Palo Alto Networks PAN-OS running on the remote host is version 5.0.x prior to 5.0.18, 6.0.x prior to 6.0.13, 6.1.x prior to 6.1.10, or 7.0.x prior to 7.0.5. It is, therefore, affected by the following vulnerabilities:

- An overflow condition exists in the GlobalProtect web portal due to improper validation of user-supplied input when handling SSL VPN requests. An unauthenticated, remote attacker can exploit this, via a crafted request, to cause a denial of service or to execute arbitrary code.
(VulnDB 135052)

- A flaw exists in the web-based management API due to improper parsing of user-supplied input to certain API calls. An unauthenticated, remote attacker can exploit this to inject and execute arbitrary OS commands.
(VulnDB 135054)


Upgrade to Palo Alto Networks PAN-OS version 5.0.18 / 6.0.13 / 6.1.10 / 7.0.5 or later.

See Also

Plugin Details

Severity: Critical

ID: 89688

File Name: palo_alto_PAN-SA-2016-0005.nasl

Version: $Revision: 1.7 $

Type: combined

Published: 2016/03/04

Modified: 2016/07/11

Dependencies: 72816

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/o:paloaltonetworks:pan-os

Required KB Items: Host/Palo_Alto/Firewall/Version, Host/Palo_Alto/Firewall/Full_Version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2016/02/25

Vulnerability Publication Date: 2016/02/25

Reference Information

OSVDB: 135052, 135054